Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions.
Bahareh PahlevanzadehSara KoleiniSuzi Iryanti FadilahPublished in: ACeS (2020)
Keyphrases
- security problems
- security mechanisms
- layered architecture
- security issues
- buffer overflow
- information security
- security vulnerabilities
- security services
- security threats
- key management
- digital signature
- security properties
- security requirements
- security measures
- resource constrained
- security breaches
- countermeasures
- security risks
- cloud computing
- cyber security
- agent architecture
- public key cryptography
- security patterns
- access control
- encryption algorithms
- security analysis
- security protocols
- encryption scheme
- smart card
- data security
- web services
- cyber attacks
- high security
- data corruption
- rfid systems
- computer security
- intrusion detection
- encryption decryption
- integrity verification
- sql injection
- critical infrastructure
- data encryption
- denial of service attacks
- smart grid
- sensitive data
- network security
- management system